Skip to main content
Log in

An efficient watermarking technique for tamper detection and localization of medical images

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

With the exponential rise of multimedia technology and networked infrastructure, electronic healthcare is coming up a big way. One of the most important challenges in an electronic healthcare setup is the authentication of medical images, received by an expert at a far-off location from the sender. With an aim to address the critical authentication issue, this paper presents a fragile watermarking technique capable of tamper detection and localization in medical/general images. We divide the cover image into 4 × 4 non overlapping pixel blocks; with each block further sub-divided into two 4 × 2 blocks, called as Upper Half Block (UHB) and Lower Half Block (LHB). The information embedded in LHB facilitates tamper detection while as that embedded in UHB facilities tamper localization. The experimental results show that, in addition to tamper detection and localization capability, the proposed technique has lesser computational complexity when compared to other state-of-art techniques. Further, the proposed scheme results in average PSNR of 51.26 dB for a payload of one bit per pixel (1bpp) indicating that the watermarked images obtained are of high visual quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Aljuaid NA, Gutub AA, Khan EA (2018) Enhancing PC data security via combining RSA cryptography and video based steganography. J Inform Secur Cybercrimes Res (JISCR) 1(1):8–18

    Google Scholar 

  • Almazrooie M, Samsudin A, Gutub AA, Salleh MS, Omar MA, Hassan SA (2018) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J King Saud Univ Comput Inform Sci Elsevier. https://doi.org/10.1016/j.jksuci.2018.02.006

    Article  Google Scholar 

  • Ansari IA, Pant M, Ahn CW (2015) Svd based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239

    Article  Google Scholar 

  • Azeroual A, Afdel K (2017) Real-time image tamper localisation based on fragile watermarking and Faber-Schauder wavelet. Int J Commun (AEÜ) 79:207–218

    Article  Google Scholar 

  • Caragata D, Assad SE, Luduena M (2015) An improved fragile watermarking algorithm for jpeg images. Int J Electron Commun 69(12):1783–1794

    Article  Google Scholar 

  • Chauhan DS, Singh AK, Adarsh A, Kumar B, Saini JP (2017) Combining Mexican hat wavelet and spread spectrum for adaptive watermarking and its statistical detection using medical images. Multimedia Tools Appl. https://doi.org/10.1007/s11042-017-5348-8

    Article  Google Scholar 

  • Gutub AA (2010) Pixel indicator technique for RGB image steganography. J Emerg Technol Web Intell (JETWI) 2(1):56–64

    Google Scholar 

  • Gutub AA, Aljuaid NA (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority. J Comput Hardw Eng. https://doi.org/10.63019/jche.v1i2.513

    Article  Google Scholar 

  • Gutub AA, Aljuaid NA, Khan EA (2017) Counting-based secret sharing technique for multimedia applications. Multimedia Tools Appl Int J Springer. https://doi.org/10.1007/s11042-017-5293-6

    Article  Google Scholar 

  • Khamlichi YI, Zaz Y, Afdel K (2006) Authentication system for medical watermarked content based image. Wseas Trans Signal Process 5:826–830

    Google Scholar 

  • Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506

    Article  MathSciNet  Google Scholar 

  • Lo CC, Hu YC (2014) A novel reversible image authentication scheme for digital images. Signal Process 98:174–185

    Article  Google Scholar 

  • Loan NA, Parah SA, Sheikh JA, Akhoon JA, Bhat GM (2017) Hiding Electronic Patient Record (EPR) in medical images: a high capacity and computationally efficient technique for e-healthcare applications. J Biomed Inform 73:125–136

    Article  Google Scholar 

  • Marie WA, Gutub AA, Mansou HA (2010) Image based steganography using truth table based and determinate array on RGB indicator. Int J Signal Image Process (IJSIP) 1(3):196–204

    Google Scholar 

  • Mohanty SP, Sengupta A, Guturu P, Kougianos E (2017) Every you want to know about watermarking from paper marks to hardware protection. IEEE Consum Electron Mag. https://doi.org/10.1109/MCE.2017.2684980

    Article  Google Scholar 

  • Nguyen TS, Chang CC, Yang XQ (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. Int J Electron Commun 70(8):1055–1061

    Article  Google Scholar 

  • Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind Watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Process Elsevier, https://doi.org/10.1016/j.dsp.2016.02.005

    Article  Google Scholar 

  • Parah SA, Ahad F, Sheikh JA, Bhat GM (2017a) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform. https://doi.org/10.1016/j.jbi.2017.01.006

    Article  Google Scholar 

  • Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017b) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools Appl 76(8):10599–10633

    Article  Google Scholar 

  • Parah SA, Sheikh JA, Akhoon JA, Loan NA (2018) Electronic health record hiding in Images for smart city applications: a computationally efficient and reversible information hiding technique for secure communication. Future Gener Comput Syst Elsevier. https://doi.org/10.1016/j.future.2018.02.023

    Article  Google Scholar 

  • Patra B, Patra JC (2012) Crt-based fragile self-recovery watermarking scheme for image authentication and recovery. In: IEEE international symposium on intelligent signal processing and communication systems, (ISPACS2012), pp. 430–435

  • Qasim AF, Meziane F, Aspin R (2018) Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review. Comput Sci Rev Elsevier 27:45–60

    Article  MathSciNet  Google Scholar 

  • Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Visual Commun Image Represent 30:312–327

    Article  Google Scholar 

  • Sengupta A (2015) Intellectual property cores protection designs for CE products. IEEE Consumer Electron Mag. https://doi.org/10.1109/MCE.2015.2484745

    Article  Google Scholar 

  • Singh AK (2017) improved hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools Appl Springer 76(6):8881–8900. https://doi.org/10.1007/s11042-016-3514-z US

    Article  Google Scholar 

  • Singh D, Singh SK (2016a) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools Appl 76(1):953–977

    Article  Google Scholar 

  • Singh D, Singh SK (2016b) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Visual Commun Image Represent 38:775–789

    Article  Google Scholar 

  • Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Gener Comput Syst Elsevier. https://doi.org/10.1016/j.future.2016.11.023

    Article  Google Scholar 

  • Singh AK, Kumar B, Singh G, Mohan A (2017) Medical image watermarking: techniques and applications, book series on multimedia systems and applications. Springer, USA (ISBN: 978–3319576985)

    Book  Google Scholar 

  • Singh S, Singh R, Singh AK, Siddiqui TJ (2018) SVD-DCT based medical image watermarking in NSCT domain. In: Hassanien AE et al. (eds) Quantum computing: an environment for intelligent large scale real application. Studies in big data, vol 33. Springer, Cham, pp. 467–488. https://doi.org/10.1007/978-3-319-63639-9_20(Print ISBN 978-3-319-63638-2)

    Chapter  Google Scholar 

  • Sreenivas K, Prasad VK (2018) Fragile watermarking schemes for image authentication: a survey. Int J Mach Learn Cybern Springer 9(7):1193–1218

    Article  Google Scholar 

  • Thakur S, Singh AK, Ghrera SP, Mohamed E (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools Appl Springer. https://doi.org/10.1007/s11042-018-6263-3

    Article  Google Scholar 

  • Tiwari A, Sharma M, Tamrakar RK (2017) Watermarking based image authentication and tamper detection algorithm using vector quantization approach. Int J Commun (AEÜ) 78:114–123

    Article  Google Scholar 

  • Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308

    Article  Google Scholar 

  • Zear A, Singh A, Kumar P (2016) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools Appl. https://doi.org/10.1007/s11042-016-3862-8

    Article  Google Scholar 

  • Zhang J, Zhang Q,.Lv H (2013) A novel image tamper localization and recovery algorithm based on watermarking technology. Optik Int J Light Electron Opt 124(23):6367–6371

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the Department of Science and Technology (DST) New Delhi, Government of India for providing financial support under DST Inspire Fellowship Scheme.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shabir A. Parah.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gull, S., Loan, N.A., Parah, S.A. et al. An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Human Comput 11, 1799–1808 (2020). https://doi.org/10.1007/s12652-018-1158-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-018-1158-8

Keywords

Navigation